Solved

Checkpoint and ISA design

Posted on 2010-08-20
2
448 Views
Last Modified: 2013-11-16
Hi,

I have a checkpoint firewall and ISA 2004 server and I want to implement a front end backend design.

I was think of putting CP External facing Internet and ISA as the backend,

ISA-------CP--------Internet

Any advice of on this ?
0
Comment
Question by:skywalker101
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Accepted Solution

by:
deimark earned 500 total points
ID: 33487973
Either way works well here as the external firewall, however, I tend to prefer the CP FW on the perimeter and ISA on the inside.

Although ISA is a good firewall in itself, I prefer to use a purpose built firewall on the outside and use ISA on the inside.  You can utilise more of the perimeter protections on CP, like the IPS blade etc

Key things to take into account for traffic and rules is where you are doing NAT.  I would pick either CP or ISA to be the master NAT device as natting on each side does add to confusion when debugging any issues

HTH
0
 

Author Comment

by:skywalker101
ID: 33490657
Yea Checkpoint will be my master natting device as I find there is a lot more functionality with CP over iSA.
0

Featured Post

DevOps Toolchain Recommendations

Read this Gartner Research Note and discover how your IT organization can automate and optimize DevOps processes using a toolchain architecture.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
To setup a SonicWALL for policy based routing to be used with the Websense Content Gateway there are several steps that need to be completed. Below is a rough guide for accomplishing this. One thing of note is this guide is intended to assist in the…
In this video, viewers will be given step by step instructions on adjusting mouse, pointer and cursor visibility in Microsoft Windows 10. The video seeks to educate those who are struggling with the new Windows 10 Graphical User Interface. Change Cu…
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question